PKI OCSP
I am trying to implement OCSP in a DMZ, I have my Issuing PKI server in the core infastructure. I have implemented OCSP in the core infastructure but cannot do the same in the DMZ, this is because I am having issues with getting a OCSP signing certificate on the OCSP server in the DMZ. The OCSP server in the DMZ can see the Issuing CA but fails to obtain a certificate. I have also tried to use certreq to manually issue the OCSP signing certificate but this also fails. I am now stuck and I am wondering if my requirement is not a supported solution. Any help would be appreciated. John
June 19th, 2011 9:08am

You would need to open the firewall to allow RPC access to the CA. (or DCOM access) Look at this article by Kurt Hudson http://social.technet.microsoft.com/wiki/contents/articles/how-to-set-a-static-dcom-port-for-ad-cs.aspx Brian
Free Windows Admin Tool Kit Click here and download it now
June 19th, 2011 4:58pm

So I am correct to assume that the Microsoft implimentation does not work in the same way as say CoreStreet where you would deploy a validation authority and then deploy a set of responders. In my design I had made the assumption that I needed a OCSP instance in my core infastructure and then another OCSP instance in the DMZ. The OCSP in the core infastructure would provide OSCP updates into the DMZ instance and external clients would get there updates from the OCSP instance in the DMZ. Is there a reference architecture for an MS OCSP implementation. John
June 20th, 2011 8:40am

Your assumptions were definitely incorrect. Here is the whitepaper that describes troubleshooting and deploying the Online Responder The Online Responder in the DMZ will need to be able to use RPCs (cannot lock down the port to the best of my knowledge) to talk to the primary Responder in the array to receive Revocation COnfiguration information. What you need to do is look at the Extranet scenario section http://download.microsoft.com/download/5/3/c/53cdc0bf-6609-4841-a7b9-cae98cc2e4a3/Installing_Configuring_and_Troubleshooting_the_Online_Responder.doc Brian <cite></cite>
Free Windows Admin Tool Kit Click here and download it now
June 20th, 2011 2:07pm

Yes, this is a different architecture that does not use pre-signed and cached responses. The architecture is basically on-line with everything going to the equivalent of the validation authority in the CoreStreet (or Tumbleweed/Axway) case. The referenced white papers give you an idea. I would be happy to discuss further.
June 25th, 2011 4:15pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics